بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
21
-
22
-
23
-
24
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
25
-
26
-
27
-
28
An enhanced quorum selection algorithm
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
29
An Improved Quorum Selection Algorithm
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
30
Boosting the visibility of services in microservice architecture
منشور في 2023"…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"
-
31
Bee Colony Algorithm for Proctors Assignment.
منشور في 2015"…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
32
-
33
-
34
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
35
A kernelization algorithm for d-Hitting Set
منشور في 2010"…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
36
A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates
منشور في 2024"…The whole piezoelectric multilayered plate’s dynamic stiffness is then built, from which its circular frequencies are computed with the help of the Wittrick-Williams algorithm. A detailed discussion is provided on the implementation aspects, followed by some numerical examples to assess the robustness, accuracy and effectiveness of the proposed method. …"
احصل على النص الكامل
article -
37
-
38
Spider monkey optimizations: application review and results
منشور في 2024"…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …"
احصل على النص الكامل
-
39
-
40
Formal synthesis of VLSI layouts from algorithmic specifications
منشور في 2020"…This formal high level syntesis system uses recursive algorithms to model the behaviour to be synthesized. …"
احصل على النص الكامل
article